SafeGuard LAN Crypt is a data encryption system that only lets authorized users and user groups access sensitive data across an organization. Its new version makes client handling even easier: The integration of Windows Explorer extensions in SafeGuard LAN Crypt 3.50 enables a quick display of encrypted files status. The details view in Windows Explorer now has an additional, optional column which displays key names. You can create encryption profiles centrally, or delegate this task to your subsidiaries. Security officers can access an unlimited number of keys, which they can assign to individual users. No problems with backing up and recovering keys because they are archived securely in an administration database. Replication mechanisms ensure that data can be synchronized throughout your company.
Encryption mode is involved in every operation: SafeGuard LAN Crypt 3.50 guarantees that encrypted files continue to be fully protected even after they are copied or moved. It makes no difference whether data is stored on mobile media and data media like UDF-formatted CDs and DVDs: it stays encrypted, no matter what happens.
System administrators can guarantee the confidentiality of data at every one of your company sites or servers as well as within regional user groups and users. As part of this process, a user's encryption rules are derived automatically from their group membership. This ensures that changes are implemented seamlessly and securely - especially important when new members of staff join the company, when people move department, or when restructuring measures are carried out. Companies that are active in the global arena will find this new version particularly attractive because it offers full Unicode support, for paths, keys, user names and certificates.
"SafeGuard LAN Crypt 3.50 will remove much of the burden of responsibility from security officers and system administrators because they can delegate key management tasks hierarchically and spread the load to other colleagues", said Thomas Huettner, Product Manager at Utimaco, describing the approach to client handling. "This mechanism assigns fixed and definite rights to a number of security officers whilst the master security officer retains all the management rights himself. This ensures that sensitive administrative tasks can only be performed under supervision." A company's data security is no longer compromised when the person responsible for a particular area goes on vacation, becomes ill or leaves the company.